{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:46:51Z","timestamp":1769737611122,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ciencia e a Tecnologia","award":["CMU\/TIC\/0064\/2019"],"award-info":[{"award-number":["CMU\/TIC\/0064\/2019"]}]},{"name":"Funda\u00e7\u00e3o para a Ciencia e a Tecnologia","award":["SFRH\/BD\/143319\/2019"],"award-info":[{"award-number":["SFRH\/BD\/143319\/2019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1145\/3524842.3528513","type":"proceedings-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:08:36Z","timestamp":1666051716000},"page":"764-765","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SECOM"],"prefix":"10.1145","author":[{"given":"Sofia","family":"Reis","sequence":"first","affiliation":[{"name":"U. of Lisbon, Lisbon, Portugal"}]},{"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"U. Porto, Porto, Portugal"}]},{"given":"Hakan","family":"Erdogmus","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Corina","family":"P\u0103s\u0103reanu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Deep learning based vulnerability detection: Are we there yet","author":"Chakraborty S.","unstructured":"S. Chakraborty , R. Krishna , Y. Ding , and B. Ray . Deep learning based vulnerability detection: Are we there yet . IEEE Transactions on Software Engineering, (01):1--1, jun 5555. S. Chakraborty, R. Krishna, Y. Ding, and B. Ray. Deep learning based vulnerability detection: Are we there yet. IEEE Transactions on Software Engineering, (01):1--1, jun 5555.","journal-title":"IEEE Transactions on Software Engineering, (01):1--1, jun 5555."},{"key":"e_1_3_2_1_2_1","first-page":"69","volume-title":"International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the (ESORICS 2017","author":"Reis Sofia","year":"2017","unstructured":"Sofia Reis and Rui Abreu . SECBENCH : A database of real security vulnerabilities . In International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the (ESORICS 2017 ), Oslo, Norway , September 14, 2017 , pages 69 -- 85 , 2017. Sofia Reis and Rui Abreu. SECBENCH: A database of real security vulnerabilities. In International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the (ESORICS 2017), Oslo, Norway, September 14, 2017, pages 69--85, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00064"},{"key":"e_1_3_2_1_4_1","volume-title":"A C\/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries, page 508--512","author":"Fan Jiahao","year":"2020","unstructured":"Jiahao Fan , Yi Li , Shaohua Wang , and Tien N. Nguyen . A C\/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries, page 508--512 . Association for Computing Machinery , New York, NY, USA , 2020 . Jiahao Fan, Yi Li, Shaohua Wang, and Tien N. Nguyen. A C\/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries, page 508--512. Association for Computing Machinery, New York, NY, USA, 2020."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3475960.3475985"},{"key":"e_1_3_2_1_6_1","volume-title":"Learning to catch security patches. CoRR, abs\/2001.09148","author":"Sawadogo Arthur D.","year":"2020","unstructured":"Arthur D. Sawadogo , Tegawend\u00e9 F. Bissyand\u00e9 , Naouel Moha , Kevin Allix , Jacques Klein , Li Li , and Yves Le Traon . Learning to catch security patches. CoRR, abs\/2001.09148 , 2020 . Arthur D. Sawadogo, Tegawend\u00e9 F. Bissyand\u00e9, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, and Yves Le Traon. Learning to catch security patches. CoRR, abs\/2001.09148, 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103009"},{"key":"e_1_3_2_1_8_1","volume-title":"D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis, page 111--120","author":"Zheng Yunhui","year":"2021","unstructured":"Yunhui Zheng , Saurabh Pujar , Burn Lewis , Luca Buratti , Edward Epstein , Bo Yang , Jim Laredo , Alessandro Morari , and Zhong Su . D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis, page 111--120 . IEEE Press , 2021 . Yunhui Zheng, Saurabh Pujar, Burn Lewis, Luca Buratti, Edward Epstein, Bo Yang, Jim Laredo, Alessandro Morari, and Zhong Su. D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis, page 111--120. IEEE Press, 2021."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/www.conventionalcommits.org\/en\/v1.0.0\/. Accessed","author":"Conventional","year":"2022","unstructured":"Conventional commits. https:\/\/www.conventionalcommits.org\/en\/v1.0.0\/. Accessed April 13, 2022 . Conventional commits. https:\/\/www.conventionalcommits.org\/en\/v1.0.0\/. Accessed April 13, 2022."},{"key":"e_1_3_2_1_10_1","volume-title":"Accessed","author":"Patterson Sean","year":"2022","unstructured":"Sean Patterson . Developer tip : Keep your commits \"atomic\". https:\/\/www.freshconsulting.com\/insights\/blog\/atomic-commits\/ . Accessed April 13, 2022 . Sean Patterson. Developer tip: Keep your commits \"atomic\". https:\/\/www.freshconsulting.com\/insights\/blog\/atomic-commits\/. Accessed April 13, 2022."},{"key":"e_1_3_2_1_11_1","volume-title":"Accessed","author":"Torvalds Linus","year":"2022","unstructured":"Linus Torvalds . Linus torvalds describes a good commit message. https:\/\/github.com\/torvalds\/subsurface-for-dirk\/blob\/a48494d2fbed58c751e9b7e8fbff88582f9b2d02\/README#L88 . Accessed April 13, 2022 . Linus Torvalds. Linus torvalds describes a good commit message. https:\/\/github.com\/torvalds\/subsurface-for-dirk\/blob\/a48494d2fbed58c751e9b7e8fbff88582f9b2d02\/README#L88. Accessed April 13, 2022."},{"key":"e_1_3_2_1_12_1","volume-title":"Accessed","author":"Beams Chris","year":"2022","unstructured":"Chris Beams . How to write a git commit message. https:\/\/cbea.ms\/git-commit\/ . Accessed April 13, 2022 . Chris Beams. How to write a git commit message. https:\/\/cbea.ms\/git-commit\/. Accessed April 13, 2022."}],"event":{"name":"MSR '22: 19th International Conference on Mining Software Repositories","location":"Pittsburgh Pennsylvania","acronym":"MSR '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 19th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524842.3528513","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524842.3528513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:35Z","timestamp":1750183775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524842.3528513"}},"subtitle":["towards a convention for security commit messages"],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":12,"alternative-id":["10.1145\/3524842.3528513","10.1145\/3524842"],"URL":"https:\/\/doi.org\/10.1145\/3524842.3528513","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}